Skip to content

Commit ab072de

Browse files
Delta456samuelgoto
andauthored
chore: update fedcm links (#650)
* chore: update fedcm links * update more links * Update explorations/alternatives_considered.md Co-authored-by: Sam Goto <[email protected]> * Update explorations/cookies.md Co-authored-by: Sam Goto <[email protected]> * Update cookies.md --------- Co-authored-by: Sam Goto <[email protected]>
1 parent f4e2a98 commit ab072de

File tree

9 files changed

+21
-21
lines changed

9 files changed

+21
-21
lines changed

README.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ This is the repository for the W3C's FedID CG Federated Credentials Management A
44

55
Explainer: [explainer.md](explainer.md)
66

7-
Work-in-progress specification: <https://fedidcg.github.io/FedCM/>
7+
Work-in-progress specification: <https://w3c-fedid.github.io/FedCM/>
88

99
## Introduction
1010

@@ -21,7 +21,7 @@ the removal of third-party cookies on federated login. Historically this has
2121
relied on third-party cookies or navigational redirects in order to function
2222
as they were the primitives provided by the web.
2323

24-
The [explainer](explainer.md) and [spec](https://fedidcg.github.io/FedCM)
24+
The [explainer](explainer.md) and [spec](https://w3c-fedid.github.io/FedCM)
2525
provide a potential API and the rational behind how that API was designed.
2626

2727
## Contributing
@@ -44,9 +44,9 @@ There are several ways to contribute to the Federated Credential Management API.
4444
* If you're an Identity Provider, there are two sides of the implementation that
4545
will be needed and any feedback on either side is appreciated.
4646

47-
1. The [Identity Provider API](https://fedidcg.github.io/FedCM/#idp-api) describes
47+
1. The [Identity Provider API](https://w3c-fedid.github.io/FedCM/#idp-api) describes
4848
the manifest and API needed server side.
49-
2. The [Browser API](https://fedidcg.github.io/FedCM/#browser-api) describes the JavaScript
49+
2. The [Browser API](https://w3c-fedid.github.io/FedCM/#browser-api) describes the JavaScript
5050
interface to FedCM which will need to be utilized.
5151

5252
* If you're a Relying Party (i.e. website) and would like to test the changes out
@@ -55,7 +55,7 @@ There are several ways to contribute to the Federated Credential Management API.
5555
JavaScript. (Until an IDP provides first party JavaScript to work with FedCM
5656
this integration will be tricker). You can also review the demo provided by the
5757
HOWTO and take a look at the
58-
[Relying Party API](https://fedidcg.github.io/FedCM/#rp-api) to see what is needed
58+
[Relying Party API](https://w3c-fedid.github.io/FedCM/#rp) to see what is needed
5959
on the RP side.
6060

6161
## Code of Conduct

explorations/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ active exploration into the problem space, potential end states, and possible
1313
solutions. These all serve the purpose of providing context, understanding and
1414
a shared idea of where we _could_ go. For a more specific document on what can
1515
be done right now, please see the
16-
[Federated Credential Management API](https://fedidcg.github.io/FedCM) proposal.
16+
[Federated Credential Management API](https://w3c-fedid.github.io/FedCM) proposal.
1717

1818
This exploration has been broken into several sections.
1919

@@ -22,7 +22,7 @@ This exploration has been broken into several sections.
2222
* What are some [related problems](related_problems.md)?
2323
* What has been tried [previously](prior.md)?
2424
1. Description of where we [should](proposal.md) be and accompanying
25-
[FedCM API](https://fedidcg.github.io/FedCM) proposal.
25+
[FedCM API](https://w3c-fedid.github.io/FedCM) proposal.
2626
* What [alternatives](alternatives_considered.md) have been explored?
2727
1. Potential [roadmap](roadmap.md) to the [proposal](proposal.md).
2828

explorations/alternatives_considered.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Alternatives Considered
22

3-
Now that we have a deep understanding of (a) the [problem](README.md) and (b) the [motivations](https://fedidcg.github.io/FedCM/#privacy-threat-model) and [topology](activation.md) of the parties involved, lets look at some **why not**s.
3+
Now that we have a deep understanding of (a) the [problem](README.md) and (b) the [motivations](https://w3c-fedid.github.io/FedCM/#privacy) and [topology](activation.md) of the parties involved, lets look at some **why not**s.
44

55
## The Status Quo
66

explorations/cookies.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Cookies
22

3-
This is a **proposal** for a high level API to support identity federation under this [threat model](https://fedidcg.github.io/FedCM/#privacy-threat-model).
3+
This is a **proposal** for a high level API to support identity federation under this [threat model](https://w3c-fedid.github.io/FedCM/#privacy).
44

55
It is widely known that browsers are either **already** blocking third party cookies or are planning to.
66

@@ -18,7 +18,7 @@ This is a proposal to preserve these operations in the absence of third party co
1818

1919
Cross-site communication is used throughout the entire lifecycle of the user signing in to a RP with an IDP, beginning at signing-up a new user all the way through managing the sessions (e.g. signing in, signing out or renewing refresh tokens).
2020

21-
From a [privacy threat model](https://fedidcg.github.io/FedCM/#privacy-threat-model) perspective, the design of this proposal is anchored on the observation that the most critical moment is when the identities between the RP and the IDP are joined for the very first time, namely when the user creates a new account in the RP using the identifiers from the IDP or when a user signs-in to an RP with an IDP for the first time in the browser: once the identities are joined, any arbitrary/uncontrolled cross-side communication can happen (with or without the browser's permission, e.g. via backchannel or cookie-less requests).
21+
From a [privacy threat model](https://w3c-fedid.github.io/FedCM/#privacy) perspective, the design of this proposal is anchored on the observation that the most critical moment is when the identities between the RP and the IDP are joined for the very first time, namely when the user creates a new account in the RP using the identifiers from the IDP or when a user signs-in to an RP with an IDP for the first time in the browser: once the identities are joined, any arbitrary/uncontrolled cross-side communication can happen (with or without the browser's permission, e.g. via backchannel or cookie-less requests).
2222

2323
In this proposal, the browser:
2424

explorations/directed_identifiers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@
2121
# Directed identifiers
2222
This document explores the ideas of [directed identifiers](glossary.md#directed-identifier) and [verifiably directed identifiers](glossary.md#verifiably-directed-identifier) in FedCM.
2323

24-
Directed identifiers are included in the FedCM proposal as an attempt to mitigate [Relying Party tracking](README.md#the-rp-tracking-problem) of users by means of [identifier correlation](https://fedidcg.github.io/FedCM/#attack-scenarios-by-rp-cross-site-correlation). As traditional tracking mechanisms have become less accessible, a fallback method for following user activity across the web has been for web sites with account systems to correlate personal identifiers associated with each account. For example, all sites that require users to use email addresses as login identifiers can collude to uniquely identify a given user across all of those sites, and profile that user's full activity across them.
24+
Directed identifiers are included in the FedCM proposal as an attempt to mitigate [Relying Party tracking](README.md#the-rp-tracking-problem) of users by means of [identifier correlation](https://w3c-fedid.github.io/FedCM#attack-scenarios-by-rp-cross-site-correlation). As traditional tracking mechanisms have become less accessible, a fallback method for following user activity across the web has been for web sites with account systems to correlate personal identifiers associated with each account. For example, all sites that require users to use email addresses as login identifiers can collude to uniquely identify a given user across all of those sites, and profile that user's full activity across them.
2525

2626
Conceptually, a directed identifer is a limited-scope identifier that has a one-way mapping from a user identifier that is known to an Identity Provider. The original identifier cannot practically be derived from the directed identifier by anyone other than the IdP or possibly the user.
2727

explorations/glossary.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ References: [OIDC terminology](https://openid.net/specs/openid-connect-core-1_0.
8686
### IDP tracking
8787
* _A privacy threat in which an [Identity Provider](#identity-provider-idp) is able to surveil or correlate user activity across the web._
8888

89-
References: [FedCM Threat Model](https://fedidcg.github.io/FedCM/#attack-scenarios-by-idp)
89+
References: [FedCM Threat Model](https://w3c-fedid.github.io/FedCM/#idp-intrusion)
9090

9191

9292
### Relying Party (RP)
@@ -106,7 +106,7 @@ References: [OIDC terminology](https://openid.net/specs/openid-connect-core-1_0.
106106
### RP tracking
107107
* _A privacy threat in which a [Relying Party](#relying-party-rp) is able to surveil or correlate user activity across the web._
108108

109-
References: [FedCM Threat Model](https://fedidcg.github.io/FedCM/#attack-scenarios-by-rp)
109+
References: [FedCM Threat Model](https://w3c-fedid.github.io/FedCM/#rp-fingerprinting)
110110

111111

112112
### Standard claims

explorations/navigations.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
# Navigations
22

3-
This is an **early exploration** of the design alternatives to address [bounce tracking](README.md#stage-2-bounce-tracking) under [this threat model](https://fedidcg.github.io/FedCM/#privacy-threat-model).
3+
This is an **early exploration** of the design alternatives to address [bounce tracking](README.md#stage-2-bounce-tracking) under [this threat model](https://w3cping.github.io/privacy-threat-model/).
44

55
This section goes over the **what** and the **how**. It presuposes that you have read and started from:
66

7-
- The **why**: the [problem statement](problem.md) and the [motivations](https://fedidcg.github.io/FedCM/#privacy-threat-model) and the [topology](activation.md) of the parties involved.
7+
- The **why**: the [problem statement](problem.md) and the [motivations](https://w3cping.github.io/privacy-threat-model/) and the [topology](activation.md) of the parties involved.
88
- The **why not**: the [alternatives considered](alternatives_considered.md) (e.g. the [prior art](prior.md), the [status quo](alternatives_considered.md#the-status-quo) and the [requestStorageAccess API](alternatives_considered.md#the-request-storage-access-api)).
99

1010
We'll then go over the [high-level overview](#high-level-design) and a breakdown into two smaller problems:
@@ -39,7 +39,7 @@ We'll go over each of these separately next.
3939

4040
The consumer API is the Web Platform privacy-oriented API that relying parties call to request information from a specific identity provider, to be used in replacement of the current redirect/popup affordances that are currently used.
4141

42-
From the perspective of [The Privacy Threat Model](https://fedidcg.github.io/FedCM/#privacy-threat-model), there are two notably distinct uses of federation:
42+
From the perspective of [The Privacy Threat Model](https://w3cping.github.io/privacy-threat-model/), there are two notably distinct uses of federation:
4343

4444
* [signing-in](glossary.md#federated-sign-in) and
4545
* [authorization](glossary.md#authorization)
@@ -128,7 +128,7 @@ Now that we looked at the surface area introduced for relying parties, lets turn
128128

129129
The purpose of the Provider API is to fulfill the invocation of [The Consumer API](#the-Consumer-api) by coordinating with the identity provider.
130130

131-
From the perspective of [The Privacy Threat Model](https://fedidcg.github.io/FedCM/#privacy-threat-model), the Provider API has a much wider set of choices and trade-offs:
131+
From the perspective of [The Privacy Threat Model](https://w3cping.github.io/privacy-threat-model/), the Provider API has a much wider set of choices and trade-offs:
132132

133133
1. Because of the [classification problem](README.md#the-classification-problem), we want to prevent a tracker from abusing this API by impersonating an IDP to track users.
134134
1. Because of the [RP tracking problem](README.md#the-rp-tracking-problem), we want to promote directed identifiers as much as we can.

explorations/proposal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -127,7 +127,7 @@ Notably, for cases where the IDP controls the deployment of the JavaScript runni
127127
```javascript
128128
// This is just a possible starting point, largely TBD.
129129
//
130-
// Note, this historical, see https://fedidcg.github.io/FedCM for the current API.
130+
// Note, this historical, see https://w3c-fedid.github.io/FedCM for the current API.
131131
//
132132
let {idToken} = await navigator.credentials.get({
133133
provider: 'https://accounts.example.com',
@@ -151,7 +151,7 @@ In this formulation, the triggering of the API works similarly as before, but th
151151
```javascript
152152
// This is just a possible starting point, largely TBD.
153153
//
154-
// Note, this historical, see https://fedidcg.github.io/FedCM for the current API.
154+
// Note, this historical, see https://w3c-fedid.github.io/FedCM for the current API.
155155
//
156156
let {idToken} = await navigator.credentials.get({
157157
provider: 'https://accounts.example.com',

privacy_questionnaire.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -107,8 +107,8 @@ resulting from browsing in incognito mode should be cleared once the user ends t
107107

108108
### 15. Does this specification have both "Security Considerations" and "Privacy Considerations" sections?
109109

110-
Security section is work in progress: https://fedidcg.github.io/FedCM/#security Privacy is discussed
111-
more in depth: https://fedidcg.github.io/FedCM/#privacy
110+
Security section is work in progress: https://w3c-fedid.github.io/FedCM/#security Privacy is discussed
111+
more in depth: https://w3c-fedid.github.io/FedCM#privacy
112112

113113
### 16. Do features in your specification enable origins to downgrade default security protections?
114114

0 commit comments

Comments
 (0)